Sciweavers

1770 search results - page 7 / 354
» Writing requirements in computer security
Sort
View
ACL
2000
13 years 9 months ago
PENS: A Machine-aided English Writing System for Chinese Users
Writing English is a big barrier for most Chinese users. To build a computer-aided system that helps Chinese users not only on spelling checking and grammar checking but also on w...
Ting Liu, Ming Zhou, Jianfeng Gao, Endong Xun, Cha...
SAC
2009
ACM
14 years 2 months ago
Impact of NVRAM write cache for file system metadata on I/O performance in embedded systems
File systems make use of part of DRAM as the buffer cache to enhance its performance in traditional systems. In this paper, we consider the use of Non-Volatile RAM (NVRAM) as a w...
In Hwan Doh, Hyo J. Lee, Young Je Moon, Eunsam Kim...
OPODIS
2003
13 years 9 months ago
Transformations for Write-All-with-Collision Model
Dependable properties such as self-stabilization are crucial requirements in sensor networks. One way to achieve these properties is to utilize the vast literature on distributed ...
Sandeep S. Kulkarni, Umamaheswaran Arumugam
JALC
2007
79views more  JALC 2007»
13 years 7 months ago
Two-Way Finite Automata with a Write-Once Track
The basic finite automata model has been extended over the years with different acceptance modes (nondeterminism, alternation), new or improved devices (two-way heads, pebbles, ...
Berke Durak
GI
2007
Springer
13 years 11 months ago
Tracking the Asymmetric Threat - Operational Requirements and Technical Solutions for Security Applications
: The asymmetric adversary poses a serious threat to civil and military facilities. Hence, the defence against such adversaries, the so-called anti asymmetric warfare, is of intere...
Felix Opitz, Kaeye Dästner, Thomas Kausch